Top Banner
1 CYBERSECURITY SERVICES FOR A SECURE RIDE { Buckle up. }
16

Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

Aug 05, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

1

CYBERSECURITY SERVICES FOR A SECURE RIDE

{Buckle up.}

Page 2: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

20+years of experience providing cybersecurity consulting services

40+ staff dedicated to providing solutions to your unique security needs

1 of only 32 nationally approved HITRUST assessors also providing PCI and ISO services

Page 3: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

1

{Table of contents.}

INTRODUCTION 2

CAPABILITIES 4

TAILORED APPROACH 6

VALUE PROPOSITION 12

Page 4: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

2

{Introduction.}

CO

NF

IDE

NT

IAL

ITY

INT

EG

RIT

Y

AV

AIL

AB

ILIT

Y

CO

MP

LIA

NC

E

INTERRUPTION

INTERCEPTION MODIFICATIONSFABRICATIONSCYBERSECURITY RISK ASSESSMENT

PEOPLELeadership

Security OfficialsEmployeesCustomers

Other EntitiesContractors

VendorsConsultants

PROCESSPhysical SecurityLogical Security

User Mgmt.Password Mgmt.

BCP/DRPChange Mgmt.

SystemsDevelopment

Incident ResponseUser Training

TECHNOLOGYFireWall

Active DirectoryVPN

EncryptionBio-metricsAnti-virusIDS/IPS

Etc.

Cybersecurity is like a rollercoaster ride for many organizations today. At times they’re upside down, in the dark, or not feeling secure. Even though there are controls in place, they’re still nervous. By focusing on three major considerations for effective cybersecurity implementations — people, process, and technology — our services are designed to help clients manage the rollercoaster ride of cybersecurity risks, and to implement and maintain effective controls during the ups and downs of the cybersecurity rollercoaster.

Over the years we’ve developed our house of security methodology that addresses everything from risk assessment, prevention, and recovery, to the full development of response procedures, security policies, and identifying information security funding.

Page 5: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

3

Based on this custom methodology and approach, we’ve developed a number of services to help you:

Understand your risk exposure to cybersecurity events

Identify controls implemented to mitigate this exposure

Assess the control design and effectiveness to identify gaps or residual risk

Facilitate implementation of tailored cybersecurity framework and control enhancements recommendations

Build training and reporting programs to enhance both user and executive management’s understanding of control activities and the effectiveness of their implementations

Page 6: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

4

{Cybersecurity capabilities.}

Cyber governance• NIST Cybersecurity Standards• COSO/COBIT Standards• SANs Top 20 Security Controls• Security awareness • Cyberincident response planning• BCP/DRP

Cyber risk assessments• Data & application mapping• Vendor management• Threat analysis• Controls mapping • Maturity models• Risk-based IT audit planning• Cybersecurity program

IT audits • General controls review

(access, physical, operational controls)

• Application controls assessment (SAP, Oracle, PeopleSoft, QAD, Plex, Epicor)

• User access reviews• ERP security & controls• Pre/Post-implementation

controls review

Attack & pen• External penetration testing• Infrastructure security assessment • Vulnerability assessment services• Social engineering tests• Web applicationsecurity• Database security • Wireless security • Virtualization security• Cloud computing security• Mobile device security

Page 7: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

5

SOC examinations • Readiness assessment• SOC 1• SOC 2• SOC 3• Privacy reviews

Security Compliance • Sarbanes-Oxley• PCI DSS• HITRUST• ISO27001 Security Standards• Financial services regulations

(FFIEC, BSA, NACHA, etc.)• Privacy regulations (HIPAA/HITECH,

GLBA, FERPA, FISMA, etc.)

OUR TEAM’S CERTIFICATIONS

CISA Certified Information Systems Auditor

CISSP Certified Information Systems Security Professional

QSA Qualified Security Assessor

CPA Certified Public Accountant

CEH Certified Ethical Hacker

CCNA Cisco Certified Network Associate

CFE Certified Fraud Examiner

CRISC Certified in Risk and Information Systems Control

CISM Certified Information Security Manager

CCSK Certificate of Cloud Security Knowledge

Page 8: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

6

{Tailored approach.}How can we help you?

Page 9: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

7

Cybersecurity is evolving with multiple attack vectors, making it difficult for organizations to manage the risks effectively. Organizations are also confused as to what standard or framework to use – i.e. NIST Cybersecurity, COSO/COBIT, CIS Critical Security Controls, ISO 270001, etc. Complicating matters further are the various security and privacy regulations.

HOW WE HELPWe will identify a risk assessment methodology that addresses the risks to your organization. Our team will further help integrate the applicable governance models, including NIST and ISO 27001.

We can help you develop a risk governance framework and a cybersecurity roadmap that is manageable and sustainable for your organization and culture.

Our services• Cyber risk assessment

• NIST cybersecurity assessment

• SANS CIS Critical Security Controls

• Cyber incident response planning

• Business continuity/ disaster recovery planning

• Security awareness training

CYBER RISK & GOVERNANCEDo you understand the risks to your business?

Page 10: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

8

No business is beyond the reach of hackers regardless of size, industry, or location. Every day, we hear about new cybersecurity hacking incidents. These attacks can originate from external hackers or, at times, even your own employees.

As technology evolves, new vulnerabilities are identified and security gaps keep widening. Most organizations become a target because of what they don’t do, or simply what they don’t know.

HOW WE HELPUsing current threat intelligence, our cybersecurity specialists will work with you to identify specific targets and launch controlled attacks from common footholds including network perimeter, remote access, unauthenticated and authenticated internal network access, enterprise applications, and physical access.

Our attack and pen reviews are performed using our threat emulation methodology, which is based on various penetration testing standards. This methodology utilizes multiple threat scenarios to simulate a real hacking incident. These threats range from external, non-knowledgeable “drive-by” attacks to targeted insiders.

Our services• Penetration testing

(external & internal)

• Vulnerability analysis (external & internal)

• Social engineering (phishing, phone calls, impersonation, etc.)

• Web application testing

• Internal network security assessment

• Wireless security assessment

ATTACK & PEN Are you vulnerable to a cybersecurity attack?

Page 11: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

9

Many organizations rely solely on their IT department to manage controls over network infrastructure and business applications. Others rely heavily on technology to secure data. Granting access can be complex and confusing to many organizations, and frequently results in unauthorized access. Additionally, organizations have the challenge of complying with various customer and legal requirements.

HOW WE HELPBy focusing on people, process, and technology, our services provide clients with a greater understanding of threats and controls.

Our IT audits focus on general controls, with the potential for additional phases to include application and user access reviews. By assessing the information security posture of your organization, we’re able to recommend areas for improvement, as well as provide you comfort in having an independent source review the maturity of the existing control environment.

Our services• General controls review

(access, physical, operational)

• Application controls assessment (access, change management, backups)

• User access reviews

• Business process controls & security

• Pre/post-implementation controls review

IT AUDITSDo your controls address confidentiality, integrity, availability, and compliance requirements?

Page 12: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

10

Recent cybersecurity incidents and regulations are forcing businesses that outsource work to demand more controls information and assurance from their service providers.

Without a current service auditor’s report, you may have to entertain multiple audit requests from customers and their respective auditors. This can place a strain on your resources. A service auditor’s report ensures that all user organizations and their auditors have access to the same information to satisfy auditor requirements.

HOW WE HELPOur team will deliver a comprehensive, timely, independent service auditor’s report regarding your control design and operating effectiveness.

We’ll identify which SOC report best fits your needs based on the services you provide. From there, we’ll perform readiness assessments to identify control weaknesses, and develop recommendations for remediation prior to undergoing the formal SOC assessment.

Our services• Readiness assessment

• SOC1 (Type I, Type II)

• SOC2 (Type I, Type II)

• SOC2+ additional subject matter

• SOC3

• Privacy reviews

SOC EXAMINATIONSHow do you provide assurance regarding your internal control environment?

Page 13: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

11

Organizations are faced with a number of privacy and security regulations. You may face compliance with various state and federal regulations. If you’re an SEC registered company you face additional Sarbanes-Oxley 404 regulations. If you accept credit card payments, you are also required to meet PCI DSS compliance. In the event of a cybersecurity incident where there is a loss of private information, organizations can face fines, legal fees, and, perhaps most detrimental, reputational damages.

HOW WE HELPWe understand the regulations you face and will help map your control environment against each applicable requirement. We’ll provide a concise overview with dashboards of your compliance status.

Additionally, our firm is a Qualified Security Assessor Company (QSA) and can certify your organization’s compliance with PCI data security standards. We’re also a CSF assessor for HITRUST and can certify your organization’s readiness and compliance with the HITRUST common security framework.

Our services• PCI DSS

• HITRUST

• ISO 27001 review

• Sarbanes-Oxley Act (Section 404), Japanese SOX

• Privacy regulations (FERPA, FISMA, GLBA, HIPAA, HITECH, Red Flags)

• Financial services regulations (FFIEC, BSA, NACHA, etc.)

SECURITY COMPLIANCEAre you in compliance with privacy and security regulations?

Page 14: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

12

{Our value proposition.}

Deep industry expertise

Our cybersecurity professionals are organized by industry, resulting in a team that knows the inherent risks you face and can provide deep subject matter expertise.

We’ll help you meet your business goals and objectives by discussing current trends and metrics, regulatory requirements, and on-target solutions.

Client focus

We have an award-winning culture based on one simple premise: we care. The result? Seamless service from talented staff who love what they do.

• 99% of our clients would recommend Plante Moran to others.

• 18 consecutive years named to FORTUNE magazine’s list of “100 Best Companies to Work For” in America, and the highest rated accounting firm for eight straight years.

Flexible, proactive solutions

Our comprehensive approach will provide you with tailored solutions based on a strong understanding of your organization, strategies, and unique risks.

Our forward-thinking perspective will keep you abreast of upcoming developments.

Our professionals know no two companies are alike; thus we provide customized solutions that are flexible to your specific needs.

Efficient approach

Our colleague partnering model, with at least two partners on your engagement team, allows us to provide you with more diverse, expert, and well-rounded thinking to solve increasingly difficult day-to-day challenges and complex issues.

Our unique “one-firm” firm philosophy and structure mean clients receive the collective power of the firm, regardless of location or geography.

We ensure no unwanted surprises with upfront planning, regular communications, and our inclusion of a standards team member on every engagement team.

Page 15: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

13

THOUGHT LEADERSHIPKnowledge to keep clients ahead of the curve

Page 16: Buckle up. - Plante Morango.plantemoran.com/acton/attachment/15093/f-073b/1... · • Maturity models • Risk-based IT audit planning • Cybersecurity program ... • External penetration

14

CY

B.092016

Stay in the know: subscribe.plantemoran.comPlease contact us with any questions.

RAJ [email protected]